Re: Piercing network anonymity in real time

2006-05-15 Thread leichter_jerrold
seeing systems like these, | though home brewed, in use for years. The availability of good tools as | a foundation (things like Snort, the layer7 iptables patch, and so on) | makes building decent layer 8 inference not far from trivial. Calling | this piercing network anonymity in real time is highly

Re: Piercing network anonymity in real time

2006-05-14 Thread Ivan Krstic
-- I've been seeing systems like these, though home brewed, in use for years. The availability of good tools as a foundation (things like Snort, the layer7 iptables patch, and so on) makes building decent layer 8 inference not far from trivial. Calling this piercing network anonymity in real time

Re: Piercing network anonymity in real time

2006-05-14 Thread StealthMonger
Ivan Krstic [EMAIL PROTECTED] writes: Calling this piercing network anonymity in real time is highly misleading; in reality, it's more like making it bloody obvious that there's no such thing as network anonymity. No. Ever hear of Chaum's Dining Cryptographers [1]? Anonymity right

Re: Piercing network anonymity in real time

2006-05-10 Thread StealthMonger
[EMAIL PROTECTED] writes: eTelemetry Locate [Image] Locate dynamically discovers, correlates and archives the person behind the IP address ... Another reason to use StealthMail -- see package description below. StealthMail still needs an